Acta Metallurgica Sinica
Home
IMR Journals
Subscription
Advertisement
Contact us
中文
Search
Citation
Fig/Tab
adv Search
Just Accepted
|
Current Issue
|
Archive
|
Featured Articles
|
Special Collection
|
Most Read
|
Most Downloaded
|
Most Cited
Top Read Articles
Published in last 1 year
|
In last 2 years
|
In last 3 years
|
All
Please wait a minute...
For Selected:
Download Citations
EndNote
Ris
BibTeX
Toggle Thumbnails
Select
Design of Driver Fatigue Recognition Algorithm Based on YOLOv8 and Face Key Points Detection
HE Zong-xi JIANG Ming-zhong XIE Ming-xia PANG Jia-bao CHEN Qiu-yan HU Yi-bo
Computer & Telecommunication 2023, 1 (
11
): 1-6.
Abstract
(
531
)
Knowledge map
Save
According to statistics, the accident rate caused by fatigue driving and mental inconcentration in traffic accidents accounts for 93%. To solve this problem, 68 key points of face are introduced in this paper. Based on deep learning and machine vision algorithm concepts, combined with YOLOv8 model and related fatigue driving judgment mechanism, PERCLOS algorithm, MAR algorithm, EAR algorithm and HPE algorithm are used to improve the accuracy and reliability of the system. A set of algorithms for recognizing tired driving behavior is successfully constructed.
Related Articles
|
Metrics
Select
The Application of AutoCAD Secondary Development
Based on C# in Communication Design
MEI Bing-fu
Computer & Telecommunication 2023, 1 (
4
): 12-. DOI:
10.15966/j.cnki.dnydx.2023.04.003
Abstract
(
500
)
Knowledge map
Save
Related Articles
|
Metrics
Select
Flag Recognition Algorithm Model Based on YOLOv3 with Retained Features
from Inverted Residuals
SHEN Ya-ting YAN Yi ZHU Kun-mei LUI Bing-bing
Computer & Telecommunication 2023, 1 (
4
): 5-. DOI:
10.15966/j.cnki.dnydx.2023.04.019
Abstract
(
465
)
Knowledge map
Save
Related Articles
|
Metrics
Select
Research on Reform and Innovation of Practical Teaching System of IoT Application Technology
PENG Hai-ling ZHOU Yuan YE Ning YIN Xiao-jun
Computer & Telecommunication 2023, 1 (
4
): 41-. DOI:
10.15966/j.cnki.dnydx.2023.04.012
Abstract
(
464
)
Knowledge map
Save
Related Articles
|
Metrics
Select
The Role of Self-built Corpus in the Teaching of Cross-Border E-Commerce Digital Operation
LU Yan-hong
Computer & Telecommunication 2023, 1 (
4
): 20-. DOI:
10.15966/j.cnki.dnydx.2023.04.005
Abstract
(
462
)
Knowledge map
Save
Related Articles
|
Metrics
Select
Computer & Telecommunication 2023, 1 (
4
): 1-4. DOI:
10.15966/j.cnki.dnydx.2023.04.018
Abstract
(
462
)
Knowledge map
Save
Related Articles
|
Metrics
Select
The Application of Stratified Project Model in the Teaching of C Language Programming
WANG Ning
Computer & Telecommunication 2023, 1 (
4
): 87-. DOI:
10.15966/j.cnki.dnydx.2023.04.009
Abstract
(
456
)
Knowledge map
Save
Related Articles
|
Metrics
Select
Research on Creative Practice Reform of Database Principle
CHEN Nan
Computer & Telecommunication 2023, 1 (
4
): 45-. DOI:
10.15966/j.cnki.dnydx.2023.04.013
Abstract
(
455
)
Knowledge map
Save
Related Articles
|
Metrics
Select
Research on Intelligent Detection Algorithm for Construction Workers' Clothing
Based on Improved YOLOv5
YANG Ji-qiong GAO Jie CHANG He-you LU Yong-qi
Computer & Telecommunication 2023, 1 (
4
): 49-. DOI:
10.15966/j.cnki.dnydx.2023.04.017
Abstract
(
453
)
Knowledge map
Save
Related Articles
|
Metrics
Select
Computer & Telecommunication 2023, 1 (
4
): 58-. DOI:
10.15966/j.cnki.dnydx.2023.04.008
Abstract
(
451
)
Knowledge map
Save
Related Articles
|
Metrics
Select
Discussion on the Application of Object-oriented Thinking Mode in Computer Specialty Teaching
LI Xiao-ling WU Yong XU Yu-ling JIA Miao-miao YANG Zhao-nan BAI Mei-jiao ZHANG Xiao-xin
Computer & Telecommunication 2023, 1 (
4
): 25-. DOI:
10.15966/j.cnki.dnydx.2023.04.004
Abstract
(
450
)
Knowledge map
Save
Related Articles
|
Metrics
Select
Design of Remote Network Interconnection Based on Deep Network Equipment VPN Technology
FENG Jian-guang ZHENG We-ihong
Computer & Telecommunication 2023, 1 (
4
): 74-. DOI:
10.15966/j.cnki.dnydx.2023.04.014
Abstract
(
449
)
Knowledge map
Save
Related Articles
|
Metrics
Select
Practice and Discussion on Teaching of Principle and Application of Big Data Technology
CAI Zhao-zhao BAI Tao ZHOU Li
Computer & Telecommunication 2023, 1 (
4
): 32-. DOI:
10.15966/j.cnki.dnydx.2023.04.001
Abstract
(
444
)
Knowledge map
Save
Related Articles
|
Metrics
Select
The Teaching Reform of Software Engineering Based on OBE
LUO Hai-li
Computer & Telecommunication 2023, 1 (
4
): 84-. DOI:
10.15966/j.cnki.dnydx.2023.04.006
Abstract
(
441
)
Knowledge map
Save
Related Articles
|
Metrics
Select
Computer & Telecommunication 2023, 1 (
4
): 28-. DOI:
10.15966/j.cnki.dnydx.2023.04.002
Abstract
(
441
)
Knowledge map
Save
Related Articles
|
Metrics
Select
The Development and Design of Loose-leaf Teaching Materials Based on "Post, Class,
Competition and Certificate"
——Take the Textbook Development of Network Security Technology for Example
ZHANG Lin
Computer & Telecommunication 2023, 1 (
4
): 54-. DOI:
10.15966/j.cnki.dnydx.2023.04.010
Abstract
(
441
)
Knowledge map
Save
Related Articles
|
Metrics
Select
Two-factor Password Authentication and Secure Transmission System
Based on Mixed Encryption of RSA and Symmetric Cryptography
QIAN Yu-bing LIU Jun
Computer & Telecommunication 2023, 1 (
4
): 79-. DOI:
10.15966/j.cnki.dnydx.2023.04.007
Abstract
(
429
)
Knowledge map
Save
Related Articles
|
Metrics
Select
Research on a 5G Post-evaluation Method Based on Multidimensional Big Data
LI Zhi-juan
Computer & Telecommunication 2023, 1 (
4
): 69-. DOI:
10.15966/j.cnki.dnydx.2023.04.016
Abstract
(
418
)
Knowledge map
Save
Related Articles
|
Metrics
Select
Computer & Telecommunication 2023, 1 (
4
): 64-. DOI:
10.15966/j.cnki.dnydx.2023.04.011
Abstract
(
414
)
Knowledge map
Save
Related Articles
|
Metrics
Select
Construction of the Evaluation Index System of Professional Competence of Network Operation
and Maintenance Posts Based on Delphi Expert Consultation Method
LI Zhi-hong CHEN Chun-yan
Computer & Telecommunication 2023, 1 (
4
): 37-. DOI:
10.15966/j.cnki.dnydx.2023.04.015
Abstract
(
404
)
Knowledge map
Save
Related Articles
|
Metrics
Select
Safety Helmet Detection Based on Lightweight YOLOv8
ZHANG Bi-chuan LIU Wei-dong MI Hao JING Ya-ning
Computer & Telecommunication 2024, 1 (
1
): 35-39. DOI:
10.15966/j.cnki.dnydx.2024.z1.017
Abstract
(
340
)
Knowledge map
Save
Helmet detection is a computer vision task with important application value, involving safety management in many fields such as construction sites, mines, and electric power. However, helmet detection also faces many challenges, such as large changes in target size and aspect ratio, rapid changes in target velocity, target occlusion, and background interference. In order to solve these problems, this paper proposes a safety helmet detection method based on YOLOv8, which uses the characteristics of high speed and high precision of YOLOv8 combined with the characteristics of safety helmets to achieve effective detection and identification of safety helmets.
Related Articles
|
Metrics
Select
Design and Implementation of Campus Ordering Backend System Based on Microservice
SU Bing
Computer & Telecommunication 2023, 1 (
11
): 23-28. DOI:
10.15966/j.cnki.dnydx.2023.11.008
Abstract
(
302
)
Knowledge map
Save
In order to alleviate the problem of seat tension in university canteens, it is urgent to develop a kind of software to solve this problem and improve the dining experience for students. This article discusses the use of the current mainstream microservice framework Spring Boot, combined with technologies such as MyBatis Plus and Vue.js, to design and implement a campus ordering system backend, which facilitates platform administrators and merchant administrators to manage dishes, packages, orders, etc., providing a solution for the problem of tight dining for college students.
Related Articles
|
Metrics
Select
Facial Feature Test and Fatigue Driving Warning Based on Deep Learning
ZHANG Miao-miao CHAI Guo-qiang YU Hai-le XU Hao-xuan
Computer & Telecommunication 2022, 1 (
12
): 1-. DOI:
10.15966/j.cnki.dnydx.2022.12.001
Abstract
(
260
)
Knowledge map
Save
Fatigue driving is an invisible killer of road traffic safety. A fatigue driving detection system based on deep learning is pro
posed in this paper to ensure the high efficiency and accuracy of detection. First, OpenCV is applied to gray preprocess the collected
image. Second, directional gradient histogram is used to extract feature and the pre-trained Dlib model is applied to calibrate 68 face
feature points. Finally, the improved detected algorithms of blink, yawn and nod are used to calculate the length width ratio of eyes
and mouth and head posture Euler angle, respectively, and compare with its corresponding threshold to determine whether the driver
is in fatigue state and take early warning measures. Experiments show that the proposed system has 97% accuracy, verifying its ef
fectiveness.
Related Articles
|
Metrics
Select
Review of Image Dehazing Algorithms
CHEN Jun-an LU Geng-you XIE Qian-yi GONG Zhi-hui LIU Jian-ping PENG Shao-hu
Computer & Telecommunication 2022, 1 (
7
): 63-. DOI:
10.15966/j.cnki.dnydx.2022.07.012
Abstract
(
257
)
Knowledge map
Save
Related Articles
|
Metrics
Select
Exploration on Computer Practice Teaching Mode Based on Curriculum Ideology and Politics
CHAI Yuan-yuan SUN Na-xin MENG Chen-ran CHENG Hui ZHENG Jing-jing
Computer & Telecommunication 2023, 1 (
1-2
): 5-7. DOI:
10.15966/j.cnki.dnydx.2023.z1.002
Abstract
(
251
)
Knowledge map
Save
This paper analyzes the importance of integrating ideological and political elements into professional courses
for the construction of vocational and technical ability and ideological and political education of military cadets,
introduces the ideas of ideological and political construction of courses and teaching design, and designs and implements
the practical teaching case of Web Design and Website Management. The conclusion emphasizes the ideas of ideological
and political construction of the curriculum and the attention points of teaching design, which will provide reference for
the teaching reform of more programming courses in the future.
Related Articles
|
Metrics
Select
An Anonymous Traffic Detection Method Based on Entropy Estimation
YIN Zhen
Computer & Telecommunication 2023, 1 (
5
): 58-. DOI:
10.15966/j.cnki.dnydx.2023.05.008
Abstract
(
232
)
Knowledge map
Save
Anonymous communication can effectively protect personal privacy and data security, but it is also used by criminals to evade network censorship and engage in various illegal activities because of its concealment. The characteristics of anonymous traffic protocols are concealed, traffic characteristics are confused, and detection of anonymous traffic is difficult. In order to strengthen the supervision of anonymous traffic, this paper proposes an anonymous traffic detection method based on entropy estimation. Through the analysis of the packet entropy characteristics of the network session, the entropy value of the encrypted message sequence is used as the input feature of the classifier, and combined with the eXtreme Gradient Boosting Tree (XGBoost) algorithm, the detection of anonymous traffic is realized. Different from the existing anonymous traffic feature detection methods based on protocol features and traffic features, this method extracts the characteristics of the traffic itself for research. The experimental results show that the accuracy of this method can reach 98%.
Related Articles
|
Metrics
Select
Real-time Facial Expression Recognition Based on Facial Feature Detection
SU Cui-wen CHAI Guo-qiang
Computer & Telecommunication 2023, 1 (
1-2
): 17-21. DOI:
10.15966/j.cnki.dnydx.2023.z1.018
Abstract
(
228
)
Knowledge map
Save
A real-time facial expression recognition based on OpenCV and Dlib model is proposed in this paper, which
avoids low recognition rate and complex extraction process in traditional methods and complex model and poor real-time
in deep learning-based methods. First, OpenCV is used to capture and pre-process images in real time. Then the Dlib
model is applied to calibrate the facial key points in the acquired face image. Finally, fifive indexes proposed in the paper,
i.e., eyebrow tilt degree, eyes open degree, upper lip to nasal tip height ratio, mouth width ratio and mouth height ratio are
combined to recognize expression. Besides, a system interface with simplifified operation is built to enhance the
practicability of the proposed method. Experiments show that the accuracy of the proposed method is above 96%, which
verififies its effffectiveness.
Related Articles
|
Metrics
Select
Operation of Mediation and Regulation Effect Based on Python Language
ZHONG Zhi-qiang GAO Hong
Computer & Telecommunication 2023, 1 (
5
): 45-. DOI:
10.15966/j.cnki.dnydx.2023.05.013
Abstract
(
221
)
Knowledge map
Save
Based on the operation of mediation and regulation effect in Python language, the analysis process of mediation and regulation effect is realized by using Pandas library and Statsmodels library of Python language, and the basic principles and analysis steps of mediation and regulation effect are clarified. It mainly demonstrates the bootstrap method instead of Sobel test in intermediary test, the realization of grouping regression by weighted least square method in adjustment test, as well as the commonly used two factor analysis of variance and interactive multiple regression analysis.
Related Articles
|
Metrics
Select
The Literature Review about Sentiment Analysis in Network Public Opinion Research in China
YOU Dan-dan LUO Shao-ye
Computer & Telecommunication 2024, 1 (
3
): 64-. DOI:
10.15966/j.cnki.dnydx.2024.03.006
Abstract
(
216
)
Knowledge map
Save
With the popularization of the internet and social media, the impact of network public opinion on the social level cannot be underestimated, and sentiment analysis in network public opinion is of utmost importance. This paper collects, organizes, and summarizes relevant literature on sentiment analysis in network public opinion research in China, adopting bibliometric methods to analyze the quantity of literature, co-occurrence of high-frequency keywords, and evolution of theme keywords. Following the pro‐ cess of sentiment analysis in network public opinion research, this study analyzes the main research content, ideas, and methods in data collection, data processing, sentiment recognition(classification/tendency),sentiment evolution. Finally, this study points out fu‐ ture research directions, and gives the working directions of next steps.
Related Articles
|
Metrics
Select
The Application of Achievement Degree Evaluation
in the Mobile Application Development Course
ZHU Dong-ling ZHOU Xiu-ying
Computer & Telecommunication 2023, 1 (
1-2
): 0-4. DOI:
10.15966/j.cnki.dnydx.2023.z1.001
Abstract
(
215
)
Knowledge map
Save
In the process of engineering education certifification, some universities have explored the evaluation of
achievement degree based on the curriculum’s support for the graduation requirements. Learning from the engineering
education certifification in universities, we do the evaluation of achievement degree in the higher vocational mobile
application development course, and apply the evaluation results to the dynamic diagnosis and improvement, the
periodical diagnosis and improvement, the development of students’ abilities. On the one hand, it can objectively evaluate
the teaching effffect of teachers and students' learning effffect, and on the other hand, it can provide a reliable basis for
teachers to continuously improve their teaching work.
Related Articles
|
Metrics
Select
Computer & Telecommunication 2023, 1 (
1-2
): 98-. DOI:
10.15966/j.cnki.dnydx.2023.z1.016
Abstract
(
215
)
Knowledge map
Save
Related Articles
|
Metrics
Select
Research on Mixed Teaching Model of Computational Thinking-oriented —— Take Data Structure for Example
SHI Zhen-tao SHAO Zi-jian HE Xiao-juan
Computer & Telecommunication 2023, 1 (
5
): 1-4. DOI:
10.15966/j.cnki.dnydx.2023.05.002
Abstract
(
214
)
Knowledge map
Save
Related Articles
|
Metrics
Select
Leading by Ideological and Political Education, Integrating Industry and Education --Research on the Teaching Innovation of Computer Network Security
BAO Hai-yan
Computer & Telecommunication 2024, 1 (
1
): 4-7. DOI:
10.15966/j.cnki.dnydx.2024.z1.001
Abstract
(
213
)
Knowledge map
Save
With the rapid development of information technology, computer network security has become a focus of social attention. This article explores the teaching innovation and practice of Computer Network Security from the perspective of "ideological and po‐ litical guidance, integration of industry and education", aiming to cultivate outstanding talents with high awareness and skills of net‐ work security. The course utilizes Xuexi Tong APP to carry out blended online and offline teaching. Through the reconstruction of course content, improvement of teaching modes, innovation of teaching methods, integration of ideological and political elements, reform of teaching evaluation, and promotion of teaching effectiveness, the educational philosophy of "moral education first, studentcentered, integration of industry and education, and continuous improvement" is adopted to achieve the deep exploration of ideologi‐ cal and political elements in the course while imparting professional knowledge, integrate professional knowledge of network and se‐ curity with production practice, strengthen school enterprise cooperation, continue teaching reform, and build a learning community for teachers and students.
Related Articles
|
Metrics
Select
Research on the Factors Influencing the Application Efficiency of E-learning Space for Primary and Secondary School Teachers Based on ISM Model
LI Gao-xiang WU Yu
Computer & Telecommunication 2023, 1 (
5
): 21-. DOI:
10.15966/j.cnki.dnydx.2023.05.006
Abstract
(
212
)
Knowledge map
Save
Network learning space is the product of the deep integration of information technology and learning science. The application efficiency of teachers' network learning space has a strong practical significance in promoting digital teaching. Based on the review of relevant literature, combined with expert interviews, this paper uses Interpretative Structural Modeling to build a hierarchical structure model that affects the effectiveness of online learning space application of primary and secondary school teachers. The research shows that space resources, self-efficacy, perceived usefulness are the direct factors that affect teachers' use of online learning space; School concept and the support of relevant policies are the basic influencing factors; Teacher related training, infrastructure conditions, space management, teacher incentive strategies and so on are indirect influencing factors. Based on the analysis of the structural characteristics, this paper gives some suggestions to promote the construction and high-quality development of online learning space for primary and secondary school teachers.
Related Articles
|
Metrics
Select
Exploration on Ideological and Political Education of Fundamentals of Program Design in IoT Major
PAN Mei-qin ZHU Fa-cai PENG Hai-ling ZHOU Yuan
Computer & Telecommunication 2023, 1 (
1-2
): 22-26. DOI:
10.15966/j.cnki.dnydx.2023.z1.007
Abstract
(
212
)
Knowledge map
Save
The ideological and political objectives of Fundamentals of Program Design condense the dual main lines of
"self-cultivation" and "talent" moral and technical courses, defifine the three-step value internalization of "personal
accomplishment, professional quality, ideals and beliefs", and integrate the four dimensions of teaching content, teaching
environment, teaching methods, and humanistic education into ideological and political education. In the teaching
process, the ideological and political quality goal of "striving for excellence, diligent learning and good thinking, unity
and innovation, dedication to work, self-cultivation and strengthening the country" runs through. A measurable and
evaluable learning evaluation system containing ideological and political literacy goals is built, so that the ideological and
political education of the curriculum can be implemented to all members, the whole process and all directions.
Related Articles
|
Metrics
Select
Research on Teaching Reform of Embedded System Based on OBE Concept
CAO Peng-fei
Computer & Telecommunication 2023, 1 (
5
): 70-. DOI:
10.15966/j.cnki.dnydx.2023.05.007
Abstract
(
210
)
Knowledge map
Save
Related Articles
|
Metrics
Select
Research on Intelligent Financial System Based on OCR and Large Language Model
HUANG Zi-cong CHEN Dian-can OU Run-feng LUO Jing PENG Xin-dong
Computer & Telecommunication 2024, 1 (
1
): 1-3. DOI:
10.15966/j.cnki.dnydx.2024.z1.005
Abstract
(
205
)
Knowledge map
Save
With the rapid development of information technology and the growing demand for financial management and financial analyses, bookkeeping is no longer limited to ordinary handwriting or manual recording in software. In order to meet the needs and development of today's era, an intelligent financial system based on OCR and large language model is designed. The system is suit‐ able for mobile phones, with financial management functions as the starting point and simplified management operations as the pur‐ pose, and realizes a system that is mainly based on OCR recognition scanning and recording bookkeeping functions, supplemented by financial analysis functions of big language model, big data consumption classification trends, and multi-version switching of ver‐ sions suitable for people of different age groups. The system not only greatly improves the efficiency of people's bookkeeping, but also promotes the intelligent financial transformation of society.
Related Articles
|
Metrics
Select
Teaching Reform and Practice for Industrial Robot Virtual Simulation Guided by Innovation and Entrepreneurship
Computer & Telecommunication 2023, 1 (
5
): 28-. DOI:
10.15966/j.cnki.dnydx.2023.05.004
Abstract
(
205
)
Knowledge map
Save
Related Articles
|
Metrics
Select
Object Detection of Traffic Road Based on Fog
GUAN Yao ZHU Kai
Computer & Telecommunication 2022, 1 (
5
): 69-. DOI:
10.15966/j.cnki.dnydx.2022.05.024
Abstract
(
201
)
Knowledge map
Save
Related Articles
|
Metrics
Select
Research and Exploration of Curriculum Ideological and Political Education
under Hybrid Teaching Mode
——Take Communication Principle for Example
ZHANG Rui
Computer & Telecommunication 2022, 1 (
12
): 36-. DOI:
10.15966/j.cnki.dnydx.2022.12.013
Abstract
(
199
)
Knowledge map
Save
Related Articles
|
Metrics
Copyright © Computer & Telecommunication, All Rights Reserved.
Powered by Beijing Magtech Co. Ltd